Skip to content

fracergu/CVE-2017-7921

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2017-7921 exploit

This script allows interaction with a CVE-2017-7921 vulnerable camera to perform the following operations:

  1. Download and decrypt a configuration file, containing the camera's admin's password.
  2. Continuously download images every second.
  3. Convert a series of downloaded images into a video.

Requirements

  • Python 3.x
  • Packages listed in requirements.txt. Install with:
pip install -r requirements.txt

Usage

The script takes the following arguments:

  • -p IP:PORT: To download and decrypt the configuration file.
  • -s IP:PORT: To download images every second. Images are saved in the snapshots/IP:PORT/ folder.
  • -c IP:PORT: Converts images from the specified camera into a video.
  • -t: Uses Tor for all requests. Ensure you have Tor service running.

Usage examples:

python script.py -p 192.168.1.10:8080
python script.py -s 192.168.1.10:8080 -t
python script.py -c 192.168.1.10:8080

Image download can be stopped by pressing Ctrl+C. Also image downloading does a check if the downloaded image is very similar to the previous one to avoid saving the same image multiple times.

Warning

Ensure you have permission to interact with the surveillance camera. Misuse of this script can be illegal and ethically wrong. Use responsibly.

About

CVE-2017-7921 exploit. Allows admin password retrieval and automatic snapshot download.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages